CN102484591A - Identifying and tracking users in network communications - Google Patents
Identifying and tracking users in network communications Download PDFInfo
- Publication number
- CN102484591A CN102484591A CN201080027355XA CN201080027355A CN102484591A CN 102484591 A CN102484591 A CN 102484591A CN 201080027355X A CN201080027355X A CN 201080027355XA CN 201080027355 A CN201080027355 A CN 201080027355A CN 102484591 A CN102484591 A CN 102484591A
- Authority
- CN
- China
- Prior art keywords
- network
- user
- identifier
- session
- customer set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method and system for providing users with wired or wireless access to communications networks such as the Internet while also providing the ability to verify the identification of users and/or monitor and track usage, as may be required by law in some parts of the world.
Description
Technical field
The present invention relates to network communication field.More particularly, the present invention relates to monitor wireless and static line access communications network, such as identifying user between the internet access periods and tracking user data.
Background technology
Many places and enterprise provide the ability with wired or wireless mode access communications network such as internet for public member or client.
Some countries have " network technique " of the strictness of controlling Internet service and use and lawful intercept, login and the use of report internet.For example, in India, information technology bill 2000 has formed the legal-code of the network technique of India.
Usually, realize that the regulator of this network technique has the requirement of two main suggestions:
-ISP (ISP) must verify they Internet user's of each internet session identity.This requirement can be called the client (KYC) who understands you;
-ISP must follow the tracks of the service time that all internets used and write down source IP address and each internet session, comprises login and cancellation time.
Regulator often requires linking between recording user session and the user identity.In some countries, also can require to be illustrated in the URL daily record of the website of being interviewed between session.For example in India, the ability of following the tracks of, writing down and visiting this type user accessing information is called as network technique and defers to (CLC).In addition, some network techniques require to be used to insert the details of the device of the internet that will follow the tracks of and write down.
These require to give retail or public internet service provider such as Internet bar, Wi-Fi Hotspot and subway Wi-Fi provider to propose sizable challenge.Provide the conventional method of these services not allow the information that provider follows the tracks of and record is necessary.
Traditionally, this provider connects to their the client single internet with single public ip address that is provided by ISP of reselling.Use DHCP (DHCP) to go up to terminal use's device such as Wi-Fi device and distribute the dynamic internal network ip address at internal lan (LAN).Use IP to pretend to be routing addressing LAN outside service, the result is that all business seem all from same single public ip address.
Also there are not source address unique identification individuality and the plain mode that installs, because source IP address is shared to all simultaneous users that serve through their business before.For example in Wi-Fi Hotspot is provided with; Possibly not follow the tracks of the user to meet CLC or KYC requirement; And preferably might track the session activation of single public ip address, and possibly have the proprietary record that uses said single public ip address separately.Device level follow the tracks of the user with sign privately or the user on the Wi-Fi Hotspot that openly provides have difficulty, if genuine possible words.Yet constantly, regulator requires more information, such as the destination address of each use.
It is through between their client and internet, placing the agency that some providers attempt overcoming the above problems an employed known method.This allows given time marking client of provider and target ip address to also have source IP address usually.This solution is problematic, because it requires management organization that destination address is provided, does not guarantee unique coupling, and the protocols limit that the client can be used those agreements for being acted on behalf of.
Summary of the invention
The purpose of this invention is to provide and be used at the communication network identifying user and follow the tracks of improving one's methods and/or equipment and/or system of user data.
Alternatively, purpose provides method and/or the equipment and/or the system of at least some supervision requirements that meet some communication networks.
Alternatively, the objective of the invention is to provide to the public at least the selection of usefulness.
According to a first aspect of the invention, provide a kind of being used to monitor method, comprising through the local access network access communications network that is configured to use by a plurality of users and/or customer set up:
In session, use customer set up that user access network is provided;
Customer set up and/or session and/or user's assignment only network identifier to local access network; And
In database, said session data is corresponding to the only network identifier with the session storage.
Preferably, local access network is special-purpose local access network.
Preferably, local access network is the local wireless Access Network.
Preferably, said method comprises to a plurality of users and/or customer set up provides the access to communication network.Each user and/or customer set up and/or session have been assigned the only network identifier, and this can be stored in the database corresponding to the session data relevant with session.
Preferably, said method comprises the session data is associated with the user.More preferably, through the session data are associated with unique user identifier the session data are associated with user in the database.
Preferably, said method is included in provides the user access network step of identifying user identity before.More preferably, verification step can comprise the remote validation user identity.The step of identifying user identity can comprise with ID being the registered user of network or other service.Alternatively, verification step can comprise the evidence of checking identify label and user's sign details are stored in the database.
Preferably, said method comprises to the unique user identifier of user's assignment.
Preferably, said method comprises personal user information is stored in the database and with personal user information and is associated with unique user identifier.
Preferably, said method comprises to the user provides the network insertion code.The network insertion code preferably is stored in the database and with unique user identifier and is associated.Preferably, said method comprises that authenticating network inserts code to allow user's access communications network.
Preferably, said method comprises provides through local wireless Access Network wireless access communication network.Preferably, wireless access network is that wireless lan (wlan) or Wi-Fi network maybe can be provided to allow a plurality of users for example at any other type network of wireless " focus " wireless access communication network.Preferably, communication network is or comprises the internet.
Thus, the present invention provides sign and tracking for example to pass through a plurality of users' of local wireless Access Network access ability.For example, different IP addresses is provided for customer set up/session of each user.
Preferably, said method comprises through any said project or the classification of the information that visits with a following project or the relevant information of classification are provided: said unique user identifier; Said only network identifier; Session data; Personal user information.
Preferably, said session data comprise following in any one or multinomial: the only network identifier; The device unique identifier; The type of device identifier; The device model identifier; The session time started; The conversation end time; Session persistence; The device link position; The network address of being interviewed.
Preferably, the only network identifier is publicly available identifier.More preferably, the only network identifier is the IP address.
Preferably, in virtual network by server to customer set up and/or session assignment only network identifier.Virtual network can comprise the route member.Virtual network can be the VPN (VPN) with safeguard protection.Server can be DHCP (DHCP) server.
Preferably, customer set up comprise following in any one or multinomial: personal computer; Kneetop computer; Personal desktop assistant (PDA); Mobile phone.Any other with required function property installs within the scope of the present invention.
According to a second aspect of the invention, a kind of local network AM access module is provided, has comprised:
Be used for to the customer set up of local access network and/or the member of session and/or user's assignment only network identifier; And
Be used for being associated and/or store and/or send member explicitly corresponding to the session data of said only network identifier with the user of said customer set up with said only network identifier.
Preferably, local access network is special-purpose local access network.
Preferably, local access network is the local wireless Access Network.
Preferably, local network AM access module comprises the member that is used to receive the only network identifier.
Preferably, local network AM access module comprises the member that is used for storing explicitly with session data and/or unique user identifier the only network identifier.
According to a third aspect of the invention we, provide a kind of being used to monitor system, comprising through the local access network access communications network that is configured to use by a plurality of users and/or customer set up:
Be used for using customer set up that the member of user access network is provided in session;
Be used for to the customer set up of local access network and/or the member of session and/or user's assignment only network identifier; And
Be used for the member of session storage at database, said session data is corresponding to the only network identifier.
The others of system of the present invention are similar to method feature of the present invention.As it will be appreciated by one of skill in the art that, concentrate (the opposite distribution) layout and the rank of system component can change as required, wherein use the data that known communication means is convenient to therebetween to transmit.
Those skilled in the art should will become clear in the additional aspects of the present invention that its all novel aspect are considered after following description of having read at least one example that practical application of the present invention is provided and appended claims.
Description of drawings
To only plan as an example and not below restrictedly to describe one or more embodiment of the present invention with reference to following accompanying drawing, in the accompanying drawing:
Fig. 1 is the flow chart that illustrates according to the method for the embodiment of the invention;
Fig. 2 is the schematic network diagram of Internet accessing network according to an embodiment of the invention.
Embodiment
The present invention puts it briefly provides a kind of method and system; Be used for to the user provide wired or the wireless access communication network such as the internet; The ability of checking ID and/or monitoring and tracking operating position also is provided simultaneously, like what possibly expect even require at some regional laws in the world.
In following the description, the present invention is described providing aspect the local wireless Access Network wireless access internet that is configured to use by a plurality of users and/or customer set up.The local wireless Access Network is normally special-purpose, but possibly be not limited thereto.The present invention generally can relate to any communication network, but is applied to the internet especially.Therefore for the ease of reference, in this is described, will use a technical term " internet ", comprise any communication network but will be understood as.
The present invention mainly describes aspect wireless access among the embodiment below, but also can be applicable to wired access, and this will be known to those skilled in the art.Local access network is the network that device is connected to through little physical region such as office, family, Internet bar etc.Device passes through generic router or hub usually or for example arrives other general access point connection of internet.This connection can be wired, for example in Local Area Network, or wireless, such as wireless lan (wlan), Wi-Fi network or Wi-Fi " focus ".Though in this specification, use a technical term " Wi-Fi network ", will recognize that the present invention also can be applicable to other local wireless Access Network.
Fig. 1 is the flow chart that illustrates according to the method for the embodiment of the invention.More particularly, in Fig. 1 briefly illustration the method for in following specification, describing.Be not Fig. 1 all be necessary to the present invention in steps, this will be described below.
In the first embodiment of the present invention, do not allow the user in the sign of at first not verifying them in case with situation that their internet session subsequently is associated under the wireless access internet.This embodiment is especially in regard to must or supervising the identity that requires the checking Internet user as law.Such as session being designated when relevant with concrete device when for example being enough to really, can omit this step.Generally speaking, the user provides personal information through opening user account or receiving the interim code that inserts, and this information is verified so that identifying user, and the user can enter the Internet thus, like following further argumentation.
According to the first embodiment of the present invention, the following method of ID checking is preferred, but can use any known method.
In one approach, the user hope through WLAN or Wi-Fi network wireless enter the Internet to Wi-Fi Virtual network operator or other ISP (ISP) for example the individual in the retail point sign evidence is provided.Also can use other method that the sign evidence is provided.The sign evidence can include but not limited to the photo or the person identifier of passport, driving license, credit card, health card or any other form.The sign which form Wi-Fi operator will define usually is acceptable, and these can change between operator.
In another approach, when opening the user account that inserts the Wi-Fi network, the long-range identity of verifying the user in advance.For example bank's details are verified the identity of user's credit card details with the affirmation user relatively.The remote identification checking of other form is known, and can use within the scope of the present invention.
In alternative approach, use the remote message means, such as Email or SMS message, the long-range identity of verifying the user in advance.Through sending remote message, user's e-mail address or telephone number is provided to ISP or Wi-Fi operator.In a preferred embodiment, send SMS message,, need identification information so that activate mobile phone because telephone operator has its subscriber identity information record usually.By contrast, sign can the electron gain addresses of items of mail yet.
In case empirical tests user's sign, usually just the personal information with the user is entered in the customer data base through interface, online World Wide Web (WWW), but can use alternative any means known.But the individual details that are entered into and are stored in the user in the database comprise unique user identifier of unique identification user.Alternatively, unique user identifier can be generated by system, for example as index or code, and in database, is associated with user's personal information.
Personal user information and/or the example of unique user identifier that can be stored in the database comprise: title; The address; Associated person information; User name; Password; Personal identification number (PIN); Phone number; SIM number; International mobile subscriber identity (IMSI) number; MSISDN number; E-mail address; Duty paragraph; Passport No.; Credit number; National insurance number; Driver license number; Healthy card number; Finger print information; Retinal information.Possibly not need all these information, minimum degree is to be enough to identifying user.
To the user network insertion code is provided, it is by the authentication of user's input as access network.The network insertion code can be any personal user information, and perhaps it can be unique user identifier, but it is preferably unique to each user.Alternatively, the network insertion code can be constituted such as username and password by multistage information.Therefore the network insertion code also is associated with the personal user information of all the other storages with unique user identifier in database, the feasible identity that can from the network insertion code of input, derive the user.
The network insertion code can be any form known, comprises alpha-numeric string, finger print data or other this type of information.The network insertion code can be to insert code temporarily.The form of code can reflect the degree that access is available, for example inserts the duration.
Can for example be included in Email or the SMS message through any any means known and the network insertion code is provided to the user.This can be in the middle transmission of replying to any Email that sends to Wi-Fi operator or SMS.
User's details are provided and receive the network insertion code and can at least partly constitute the registered user who opens user account or the user registered as the Wi-Fi network.Like this, the user can for example use same code access network once more in the future.According to an embodiment, user account can be user's conventional existing account (such as their family's broadband account), through third party's access point access of the present invention's regulation.The user can be included in this long-range use in their bag, perhaps can apply independent condition/charging.Alternatively, as mentioned above, code can only provide interim access.Receiving the network insertion code can require with any form known payment.For example can the cash equivalent volume or the token form network insertion code is provided.
When the user hoped to insert the Wi-Fi network, their fan-in network inserted code, and to carry out authentication be known with checking user's sign to this code and/or the user is the registered user with respect to being stored in value in the database.The user can provide the network insertion code through interface, World Wide Web (WWW) or other data input link such as for example keyboard or fingerprint scanner.
In case authenticated user just provides the access to the internet, and sets up session.
The second embodiment of the present invention, the details of wherein following the tracks of user's internet session are described now.Regardless of the identity of whether having verified the user according to first embodiment, this all takes place.
In order to follow the tracks of user conversation, the present invention gives each user and/or session and/or customer set up assignment only network identifier, normally IP address.The only network identifier is publicly available, that is to say, it can obtain from the Wi-Fi network-external.Therefore, be unlike in the known system, all business in the Wi-Fi network seem not and same IP address.This realizes with the mode of discussing hereinafter.
Fig. 2 is the schematic network diagram of local wireless Access Network 20 according to an embodiment of the invention.In order to follow the tracks of user conversation, be each user conversation assignment unique ip address.This realizes through get back to central Dynamic Host Configuration Protocol server 24 operation VPN 22 from each Wi-Fi router two 3.Common subnet is labeled as " 10.Y " in Fig. 2, and VPN is based upon on the subnet that is labeled as " 10.X ".Sample address shown in Fig. 2 is preserved for dedicated network usually and uses from RFC1918 standard (address assignment of private internet).Yet, the invention is not restricted to this mode.In Fig. 2, use these marks to represent the arbitrary address space, it is normally public, but it can be special-purpose.
Dotted arrows indication 25 DHCP service from Dynamic Host Configuration Protocol server to Wi-Fi user.Dynamic Host Configuration Protocol server 24 among Fig. 2 has proprietary name " tunnel terminator (TT) ", will be called it so hereinafter.TT 24 provides IP the address to customer set up from the pond of centralized maintenance.This has been avoided needs that IP is pretended to be, and has guaranteed that each device uses unique source IP address in session persistence.
On TT 24, follow the tracks of of the access of Wi-Fi device to internet 26.When setting up session, TT follows the tracks of and storage of session data.Session data can comprise following in any one or multinomial: the only network identifier is such as source IP address; The device unique identifier is such as hardware mac address; The type of device identifier; The device model identifier; The session time started; The conversation end time; Session persistence; The device link position; The network address of being interviewed.Preferred remote authentication dial-in customer service (RADIUS) agreement of using realizes the session book keeping operation, but also can use other bookkeeping methods to send conversation metadata from the Wi-Fi router to TT.Alternatively, can on TT, carry out service observation following the tracks of HTTP URL request and other net related user activity, and can write down should activity.Alternatively, can use the firewall rule on the TT to retrain User Activity.
The session data of storage is stored in the Relational database that is associated with unique user identifier or links, and for example is stored in the relational database of the unique user identifier of storage.Therefore, session data also is associated with other userspersonal information.Therefore, can provide following in each so that obtain about any other information in following: session data; Unique user identifier; Only network identifier (IP address); Personal user information.Therefore, can use which user of session data sign to be associated with which session.Advantageously, if the user has inserted network with swindle, illegal or other unsuitable mode, then can use session details to identify and consumer positioning as the session data storage.
The interface, World Wide Web (WWW) is provided as usually and makes that but the authorized person can be according to session data for example through source IP address and/or inquiring user activity service time also other method of operational analysis user data, and this will be known to those skilled in the art.
In some cases, the existing process of company and infrastructure possibly be difficult to use public ip address.If, then can use this method to mate the address space of Wi-Fi Hotspot and existing equipment, allow to use other tracking thus, such as the known method that uses the agency.
In the third embodiment of the present invention, follow the tracks of the details of user's internet session.This can take place, no matter whether verified user's identity and whether to the user public routable ip address is provided according to second embodiment according to first embodiment.
In order to follow the tracks of user conversation, the present invention gives each user and/or session and/or customer set up assignment only network identifier, forms (combination identifiers hereinafter referred to as) by publicly available share I P address and private ip address.The shared network identifier is publicly available, that is to say, it can obtain from the Wi-Fi network-external.Preferably give each user's set assignment private ip address.This preferably is used to be connected to the router execution of external network by these devices.Router is preferably carried out IP and is pretended to be between user's set, to share public ip address.
Use IP to pretend to be the User Activity of between a plurality of user's sets, sharing single public ip address in order to follow the tracks of, the details of each connection that the user opens all are sent to service platform, and they are recorded in the database (hereinafter referred to as connecting database) at this.
Connect for each TCP that opens, the IP address of turn-on time, combination identifiers and the service that inserting is recorded in and is connected in the database.Can write down other sign details, such as (but being not limited to) source and target port.
In order to identify the user who inserts concrete service, in connecting database, search the IP address of the service that is inserting.The time that use connects identifies the specific linkage record that connects in the database, and given correlation combiner identifier is confirmed the user.
The present invention can be embodied as hardware or software solution, perhaps the combination of the two.For example, the software of embodiment of the present invention may operate on the prior wireless network hardware.Alternatively, can add a new hardware to being provided for wireless network of the present invention, such as module or other unit.This those skilled in the art will recognize that assembly of the present invention (comprising database) can be concentrated or be distributed on the network as required.
To the reference of any prior art not in this manual and should not be regarded as prior art is formed on any in the world country admitting or any type of suggestion at the general general knowledge of part of area of endeavor.
Preceding text have been mentioned integral body or the assembly with known equivalents in describing, and those whole combinations in this article are like having been set forth separately.
Should be noted that various changes and modification to presently preferred embodiment described herein will be obvious to those skilled in the art.Can carry out such change and modification, and not break away from the spirit and scope of the present invention, and not reduce its attendant advantages.Therefore, intention is such change and revises in the present invention involved.
Claims (17)
1. a monitoring is through the method for local access network access communications network, and this local access network is configured in one or more sessions, used by a plurality of users and/or customer set up, and said method comprises:
In session, use the respective client device to provide one or more users to insert said network;
To the said of said local access network or each customer set up and/or session and/or the corresponding only network identifier of user's assignment; And
Corresponding session data is stored in the database, and said session data is corresponding to said corresponding only network identifier.
2. according to the method for claim 1, comprise the session data are associated with corresponding said user.
3. according to the method for claim 1 or 2, be included in to provide and insert the identity that said network is verified said user before.
4. according to each method in the above claim, comprising:
Corresponding personal user information is stored in the database; And
Said personal user information is associated with corresponding unique user identifier.
5. according to each method in the above claim, comprising:
Provide corresponding network to insert code for said user; And
The said network insertion code of authentication inserts said communication network to allow said user.
6. according to each method in the above claim, comprise providing through the said communication network of the wired or wireless access of local area network (LAN).
7. according to each method in the above claim, comprise that customer set up and/or the session to said or each user provides different IP addresses.
8. according to each method in the above claim, comprise through any one or a plurality of said project or classification of the information that visits with one or more following projects or the relevant information of classification are provided:
Said unique user identifier;
Said only network identifier;
Session data;
Personal user information.
9. according to each method in the above claim, wherein said session data comprise following in any one or multinomial:
The only network identifier;
The device unique identifier;
The type of device identifier;
The device model identifier;
The session time started;
The conversation end time;
Session persistence;
The device link position;
The network address of being interviewed.
10. according to each method in the above claim, wherein said only network identifier comprises or the IP address.
11. according to each method in the above claim, wherein said only network identifier comprises it being first identifier in the outside observable public IP available of said local access network address.
12. according to each method in the above claim, wherein said only network identifier comprises it being second identifier of the private ip address that is limited to visit.
13. a local network AM access module comprises:
Be used for assignment or receive customer set up and/or the session and/or the user's of local access network the member of only network identifier; And
Be used for being associated and/or be associated with the user of said customer set up and/or store and/or send member with said customer set up explicitly corresponding to the session data of said only network identifier with said only network identifier.
14. one kind is used to monitor the system through local access network access communications network, this local access network is configured to used by a plurality of users and/or customer set up, and said system comprises:
Module according to claim 13; And/or
Be suitable for realizing member according to each method among the claim 1-12.
15. the method for local access network access communications network is passed through in a monitoring, this local access network is configured in one or more sessions, used by a plurality of users and/or customer set up, and this method is basically as described with reference to accompanying drawing in the preceding text.
16. a local network AM access module is basically as described with reference to accompanying drawing in the preceding text.
17. one kind is used to monitor the system through local access network access communications network, this local access network is configured to used by a plurality of users and/or customer set up, and this system is basically as described with reference to accompanying drawing in the preceding text.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NZ576526 | 2009-04-24 | ||
NZ57652609 | 2009-04-24 | ||
PCT/NZ2010/000078 WO2010123385A1 (en) | 2009-04-24 | 2010-04-23 | Identifying and tracking users in network communications |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102484591A true CN102484591A (en) | 2012-05-30 |
Family
ID=43011299
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201080027355XA Pending CN102484591A (en) | 2009-04-24 | 2010-04-23 | Identifying and tracking users in network communications |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102484591A (en) |
WO (1) | WO2010123385A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144092A (en) * | 2013-12-03 | 2014-11-12 | 国家电网公司 | Method for being automatically access to LAN terminal |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480486B (en) * | 2010-11-24 | 2015-07-22 | 阿尔卡特朗讯公司 | Method, device and system for verifying communication session |
US8594617B2 (en) * | 2011-06-30 | 2013-11-26 | The Nielsen Company (Us), Llc | Systems, methods, and apparatus to monitor mobile internet activity |
US9590966B2 (en) * | 2013-03-15 | 2017-03-07 | Intel Corporation | Reducing authentication confidence over time based on user history |
WO2014142947A1 (en) | 2013-03-15 | 2014-09-18 | Intel Corporation | Continuous authentication confidence module |
EP3975014A1 (en) | 2013-03-15 | 2022-03-30 | INTEL Corporation | Technologies for secure storage and use of biometric authentication information |
US9762688B2 (en) | 2014-10-31 | 2017-09-12 | The Nielsen Company (Us), Llc | Methods and apparatus to improve usage crediting in mobile devices |
WO2018035863A1 (en) * | 2016-08-26 | 2018-03-01 | Cheng Raymond Shu Kwok | A technique for allowing registered mobile users of the same or different social networks in the vicinity to use mobile devices of the same or different operation system to identify each other and exchange business information |
US10505894B2 (en) | 2016-10-13 | 2019-12-10 | Microsoft Technology Licensing, Llc | Active and passive method to perform IP to name resolution in organizational environments |
US20180343317A1 (en) * | 2017-05-26 | 2018-11-29 | Microsoft Technology Licensing, Llc | Discovery Of Network Device Roles Based On Application Level Protocol Parsing In Organizational Environments |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1656453A (en) * | 2002-02-08 | 2005-08-17 | 摩托罗拉公司 | System for providing continuity between session clients and method therefor |
US7281059B2 (en) * | 2000-09-08 | 2007-10-09 | Samsung Electronics Co., Ltd. | Method for using a unique IP address in a private IP address domain |
US20080060064A1 (en) * | 2006-09-06 | 2008-03-06 | Devicescape Software, Inc. | Systems and methods for obtaining network access |
-
2010
- 2010-04-23 CN CN201080027355XA patent/CN102484591A/en active Pending
- 2010-04-23 WO PCT/NZ2010/000078 patent/WO2010123385A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7281059B2 (en) * | 2000-09-08 | 2007-10-09 | Samsung Electronics Co., Ltd. | Method for using a unique IP address in a private IP address domain |
CN1656453A (en) * | 2002-02-08 | 2005-08-17 | 摩托罗拉公司 | System for providing continuity between session clients and method therefor |
US20080060064A1 (en) * | 2006-09-06 | 2008-03-06 | Devicescape Software, Inc. | Systems and methods for obtaining network access |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144092A (en) * | 2013-12-03 | 2014-11-12 | 国家电网公司 | Method for being automatically access to LAN terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2010123385A1 (en) | 2010-10-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102484591A (en) | Identifying and tracking users in network communications | |
JP4722056B2 (en) | Method and apparatus for personalization and identity management | |
CN101025806B (en) | Method of fee payment via mobile communication terminal | |
CN100461686C (en) | Biostatistically verified VLAN | |
US20150327205A1 (en) | Simple mobile registration mechanism enabling automatic registration via mobile devices | |
CN1879071B (en) | Method and system for the authentication of a user of a data processing system | |
CN102437914B (en) | Method by utilizing telecommunication network to supply user identity label and user identity authentication to Internet service | |
CN108009825A (en) | A kind of identity management system and method based on block chain technology | |
EP2731396A1 (en) | Wireless local area network access apparatus and operating method thereof | |
CN100397814C (en) | Uniform identication method and system based on network | |
CN101809968A (en) | Facilitating heterogeneous authentication for allowing network access | |
CN104303483A (en) | User-based identification system for social networks | |
CN107454064A (en) | A kind of visitor's authentication method and system based on public number | |
CN110198265A (en) | Information processing method, system, device, equipment and medium | |
CN108022100A (en) | A kind of cross-certification system and method based on block chain technology | |
EP2629553B1 (en) | Method to retrieve personal data of a customer for delivering online service to said customer | |
CN103812836A (en) | System and method for website to send user reserved information | |
CN107113613A (en) | Server, mobile terminal, real-name network authentication system and method | |
CN109300199A (en) | Attendance checking system and Work attendance method based on block chain | |
CN102165480A (en) | Mobile banking with short message service | |
CN106302117A (en) | Message delivery system, method and apparatus | |
JP2019510326A (en) | Internet portal system and its usage | |
US20050210288A1 (en) | Method and apparatus for eliminating dual authentication for enterprise access via wireless LAN services | |
CN106789905A (en) | A kind of network access equipment and method | |
US20130183934A1 (en) | Methods for initializing and/or activating at least one user account for carrying out a transaction, as well as terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120530 |